Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kamil Kulesza is active.

Publication


Featured researches published by Kamil Kulesza.


Artificial intelligence and security in computing systems | 2003

On automatic secret generation and sharing for Karin-Greene-Hellman scheme

Kamil Kulesza; Zbigniew Kotulski

The secret considered is a binary string of fixed length. In the paper we propose a method of automatic secret generation and sharing. We show how to simultaneously generate and share random secret. Such a secret remains unknown until it is reconstructed. Next, we propose a method of automatic sharing of a known secret. In this case the Dealer does not know the secret and the secrets Owner does not know the shares. We discuss how to use extended capabilities in the proposed method.


Electronic Notes in Theoretical Computer Science | 2006

On Mobile Agents Resistance to Traffic Analysis

Kamil Kulesza; Zbigniew Kotulski; Konrad Kulesza

This paper will concern itself with a formulation of a traffic analysis problem for mobile agents. It is an interesting theoretical problem as well as a critical feature when using agents on a massive scale in decision making systems. The decision making systems are applied to demanding and complex environments such as stock markets. The mobile agents used are natural targets for attacks because they provide information for decision making. The resulting information can have a value measured in millions of dollars and information of such a high value attracts potential attacks. An efficient way to attack the user of decision making systems is to learn her strategy and respond in kind. In this respect even passive observation of agents can provide useful data, namely what information they are gathering. A common first defense is to provide anonymity for mobile agents. However, what happens when anonymity is gone? What information then becomes available and what steps will the user take? Yet, the problem has not been previously formulated for such a framework. We formulate it in terms of various factors used for traffic analysis. These factors originate from different side channels that provide information on the operating agents. At the end we state a paradox, which links an excessive use of countermeasures against traffic analysis with weakening system security.


Mathematica Applicanda | 2016

When perfect is not ideal, or mathematical methods for secret sharing

Kamil Kulesza; Paweł Nowosielski

The paper is concerned with secret sharing schemes, a family of cryptographic protocols. First, we describe the basic schemes. Next, we present general secret sharing and the approach based on information theory. Finally, we outline extended capabilities of secret sharing schemes. An additional contribution of the paper is our effort to present unified terminology in Polish.


conference on computer as a tool | 2007

On a Check-Digit Method Based On Graph Coloring

Kamil Kulesza; Zbigniew Kotulski

We propose a check-digit scheme that makes use of graph vertex coloring. It complements known schemes, which rather make use of the graph structure. Our scheme can be used simultaneously with them to compensate for mutual weaknesses. We show that feasibility of the proposed scheme increases with the size of the number whose digits are checked, and with the overall probability of digit errors.


Medical Hypotheses | 2008

Humans cannot consciously generate random numbers sequences: Polemic study

Małgorzata Figurska; Maciej Stańczyk; Kamil Kulesza


european symposium on research in computer security | 2002

On alternative approach for verifiable secret sharing

Kamil Kulesza; Zbigniew Kotulski; Joseph Pieprzyk


Lecture Notes in Computer Science | 2005

Addressing new challenges by building security protocols around graphs

Kamil Kulesza; Zbigniew Kotulski


arXiv: Cryptography and Security | 2003

On secret sharing for graphs

Kamil Kulesza; Zbigniew Kotulski


arXiv: Combinatorics | 2002

On graph coloring check-digit method

Kamil Kulesza; Zbigniew Kotulski


Archive | 2008

Estimating the volatility of property assets

Jeff Dewynne; Tom Fischer; Sam Howison; Kamil Kulesza; A. A. Lacey; Karina Piwarska; David Wilkie; Maxim Zyskin; Angus MacDonald

Collaboration


Dive into the Kamil Kulesza's collaboration.

Top Co-Authors

Avatar

Zbigniew Kotulski

Warsaw University of Technology

View shared research outputs
Top Co-Authors

Avatar

Matt Blaze

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Bruce Christianson

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar

George Danezis

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Maciej Stańczyk

Polish Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

James A. Malcolm

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar

Jeff Dewynne

University of Southampton

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge